About Me

Since the 1990s I have been very involved with fighting the military "don't ask don't tell" policy for gays in the military, and with First Amendment issues. Best contact is 571-334-6107 (legitimate calls; messages can be left; if not picked up retry; I don't answer when driving) Three other url's: doaskdotell.com, billboushka.com johnwboushka.com Links to my URLs are provided for legitimate content and user navigation purposes only.
My legal name is "John William Boushka" or "John W. Boushka"; my parents gave me the nickname of "Bill" based on my middle name, and this is how I am generally greeted. This is also the name for my book authorship. On the Web, you can find me as both "Bill Boushka" and "John W. Boushka"; this has been the case since the late 1990s. Sometimes I can be located as "John Boushka" without the "W." That's the identity my parents dealt me in 1943!

Monday, January 14, 2019

Yes, if you look up information on how to commit a crime, on
porn, on terrorism, on fetishes – one of the respondents says, “I’m a writer,
what can I say?”

Maybe that’s a relevant answer in this area where
independent content creation is coming under attack from radicals on both
sides.

It’s possible that in the future law enforcement will scan
cloud backups even more than it can today.

The other objection is that it will lead to the serving of
ads on your “family computer” that you don’t want your spouse or the kids to
see.

Thorin Klowowski gives a discussion of what the use of a TOR
browser (“the Onion browser”) accomplishes for the average user.It does provide “anonymity” but not real “security”.And it is possible for very determined law
enforcement (or the NSA) to crack it, so overuse of it could call attention to
illegal motivations and weaken a claim of credibility should improper online
behavior come to notice in other means (especially in civil cases).Electronic Frontier Foundation has encouraged
ordinary bloggers and vloggers to learn to use it, however, even in democratic,
western countries.

Monday, January 07, 2019

On an Amtrak train, my laptop connected to somebody else’s
hotspot before connecting to mine.It
even offered an automatic connection, which it should not do if I’ve never
supplied a correct pw.A flaw in Verizon
software?In Windows 10 security?

Train was at a station, might have been someone’s house near
the tracks. Maybe they didn’t set a pw?

Sunday, December 02, 2018

On Thursday, I installed the Smart News app on my
iPhone.It is true that I had to look
around for the right Apple password, as I had not used it for a while.

I later got this bizarre email (shown) from a spammer saying
my account was “signed on with another device”.That may be OK, but not the sender address of
“account.mail.verify.complite”.What’s
going on?

Thursday, November 15, 2018

US Cert in Pittsburgh has a collaborative report between US
DHS and the British Commonwealth (UK, Canada, Australia, New Zealand), an Alert
AA18-284A. about “publicly available hacking tools” seen in worldwide cyber
incidents.

Most of the tools presented here seem determined to provide
hidden readers for corporate espionage.

But concern persists that China, North Korea, and Russia can
continue to do destructive attacks on relatively innocuous American interests, “to
prove we can”.

There were some sporadic backbone router outages early Monday Nov 12
which might have been malicious.Since
US social media companies and perhaps hosts have no-platformed what they
believe to be Russian fake accounts and “fake news” bots, the Russians might
attack legitimate smaller interests in the US (or, more likely, the infrastructure supporting
them) just to prove they can, as retaliation.

One other thing –
there seems to be some phishing spam going around claiming to raise money for
Florida recounts.

Thursday, November 01, 2018

If you get unusual volumes of emails, texts, robocalls, twitter
mentions, Facebook postings in your timeline (or page if you allow multiple
admins – a dubious idea now) or even US mail letters – about causes to which
you have no connection and have no interest in supporting – just be careful,
and watch your back.

It can mean someone views you as a threat to them.Perhaps you’re lowballing them in business,
or they think you are.

This goes a little beyond depending on spam filters or being
careful about emails purporting to be from parties you know but looking
odd.

This is a matter that intelligence services and CIA and NSA people
know well.

It’s even conceivable that spammers will send out sham “no-platforming”
takedown emails (from social media platforms, domain registrars or hosts,
claiming some sort of connection to a terms of service violation).The first place to verify is the sender
address with a mouseover, but sometimes those are masqueraded successfully.

Analytics

Privacy Policy

Privacy Policy for billsinternetsafety.blogspot.com

If you require any more information or have any questions about my privacy policy, please feel free to contact me by email at JBoushka@aol.com.

At billsinternetsafety.blogspot.com , the privacy of my visitors is of extreme importance to me. This privacy policy document outlines the types of personal information is received and collected by billsinternetsafety.blogspot.com and how it is used.

Log Files Like many other Web sites, billsinternetsafety.blogspot.com makes use of log files. The information inside the log files includes internet protocol ( IP ) addresses, type of browser, Internet Service Provider ( ISP ), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user’s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

Cookies and Web Beacons billsinternetsafety.blogspot.com does not use cookies.

DoubleClick DART Cookie

.:: Google, as a third party vendor, uses cookies to serve ads on billsinternetsafety.blogspot.com .
.:: Google's use of the DART cookie enables it to serve ads to your users based on their visit to billsinternetsafety.blogspot.com and other sites on the Internet.
.:: Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following link.

Some of my advertising partners may use cookies and web beacons on my site. My advertising partners include ....... Google Adsense

These third-party ad servers or ad networks use technology to the advertisements and links that appear on billsinternetsafety.blogspot.com send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.

billsinternetsafety.blogspot.com has no access to or control over these cookies that are used by third-party advertisers.

You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. billsinternetsafety.blogspot.com 's privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.

If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browsers' respective websites.